skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 48900 Add to Shopping cart Find in a Library
Title: GUIDE TO EDP (ELECTRONIC DATA PROCESSING) AND EFT (ELECTRONIC FUNDS TRANSFER) SECURITY BASED ON OCCUPATIONS
Author(s): ANON
Corporate Author: Federal Deposit Insurance Corporation
United States of America
Date Published: 1977
Page Count: 83
Sponsoring Agency: Federal Deposit Insurance Corporation
Washington, DC 20429
National Institute of Justice/
Rockville, MD 20849
Sale Source: National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America

Federal Deposit Insurance Corporation
550 17th Street, NW
Washington, DC 20429
United States of America
Document: PDF
Language: English
Country: United States of America
Annotation: GUIDELINES FOR DETECTING AND PREVENTING ACCIDENTAL OR INTENTIONAL ABUSE OF EDP (ELECTRONIC DATA PROCESSING) AND EFT (ELECTRONIC FUNDS TRANSFER) SYSTEMS BY EMPLOYEES ARE PRESENTED.
Abstract: THE GUIDE IS DESIGNED FOR BANK EXAMINERS WHO EVALUATE AUDIT EFFECTIVENESS, FOR AUDITORS WHO EVALUATE COMPUTER SYSTEMS AND NETWORK SECURITY, AND FOR EDP MANAGERS. THE GUIDE IS ORGANIZED AROUND 20 OCCUPATIONS CHOSEN BECAUSE THEY INVOLVE SKILLS, KNOWLEDGE, AND ACCESS RELEVANT TO THE SECURITY OF COMPUTER SERVICES AND ASSETS FOUND IN EDP AND EFT. FOUR CLASSES OF VULNERABILITIES (PHYSICAL, TRANSACTIONAL, PROGRAMMING, AND ELECTRONIC), 17 TYPES OF AUDIT TOOLS AND TECHNIQUES FOR DETECTION, AND 8 CLASSES OF CONTROLS FOR DETECTION AND PREVENTION ARE IDENTIFIED. FOR EACH OCCUPATION, THE FOLLOWING INFORMATION IS PRESENTED: JOB FUNCTIONS; PROBABLE EFT EMPLOYERS; SECURITY-RELEVANT SKILLS, AND WORK AREA ACCESS; VULNERABILITIES OF AN EDP SYSTEM TO ACCIDENTAL OR INTENTIONAL ACTS BY A PERSON IN THE OCCUPATION; AUDIT TOOLS AND TECHNIQUES AND EDP CONTROLS THAT CAN REDUCE THE VULNERABILITIES; AND RELATED ISSUES AND PROBLEMS. OTHER SECTIONS OF THE GUIDE DESCRIBE THE EDP AND EFT ENVIRONMENT, GENERAL REMEDIES THAT APPLY TO EDP AND EFT PERSONNEL, CLASSIFICATION OF VULNERABILITIES, AND AUDIT TOOLS AND CONTROLS. CHARTS AND DIAGRAMS ARE PROVIDED. (AUTHOR ABSTRACT MODIFIED--LKM)
Index Term(s): Computer abuse; Computer privacy and security; Personnel
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=48900

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.